Java Games: Flashcards, matching, concentration, and word search.

Chapter 11 Part 2

Pages 570 - 578

AB
Hardware theftthe act of stealing computer equipment
Hardware vandalismthe act of destroying computer equipment.
Software piracythe unauthorized and illegal duplication of copyrighted software.
license agreementgive the user the right to use the software - you don't own it!!
EULAend-user license agrement
information theftwhen someone steals personal or confidential information.
encryptionthe process of converting readable data into unreadable characters to prevent theft
decryptto change encrypted data back into readable form
digital signaturean encrypted code that a person, site or organization attached to a message.
secure sitea web site that uses encryption techniques
digital certificatea notice that guarantees a user or web site is legitimate.
transport layer securityprovides encryption of all data that passes between a client and server.
VPNvirtual private network
Noiseany unwanted signal that is mixed with the normal voltage entering the computer.
surge protectoruses special electrical components to smooth out minor noise
UPSuninterruptible power supply
backupa duplicate of a file, program or disk
restoreto copy files that were backed up back into the original location.


EES Media Specialist
Ellijay Elementary School
Ellijay, GA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities